Optimized multi-party certified email protocols
نویسندگان
چکیده
Purpose – As a value-added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. This paper aims to present two optimized multi-party certified email protocols. Design/methodology/approach – Reviews two existing email protocols and provides a modified version to overcome their security flaws and weaknesses. Extends the two-party protocol to a multi-party scenario. Findings – Both of the protocols have three major features. A sender could notify multiple recipients of the same information while only those recipients who acknowledged are able to get the information. Both the sender and the recipients can end a protocol run at any time without breach of fairness. The exchange protocols are optimized, each of which has only three steps, and the trusted third party will not be involved unless an exception (e.g. a network failure or a party’s misbehavior) occurs. Originality/value – Provides a focus on a value-added service – certified email.
منابع مشابه
On the Security of a Multi-party Certified Email Protocol
As a value-added service to deliver important data over the Internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need...
متن کاملNo Author-Based Selective Receipt in Certified Email with Tight Trust Requirements
Kremer and Markowitch introduced in [10] a new property for certified email protocols called no author-based selective receipt, and proposed two new protocols respecting it. In this paper we show that these protocols implicitly require the sender of the email to trust the trusted third party to assure this property. We propose a new protocol in which this trusted third party has only to be trus...
متن کاملSome common attacks against certified email protocols and the countermeasures
Certified email is a value-added service for standard email systems, which guarantees the fairness, i.e., the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation receipt showing that the message has been received by the recipient. As far as security is concerned, fairness is the most important requirements, though some other properties are also...
متن کاملA Power-Aware Multi-Level Cache Organization Effective for Multi-Core Embedded Systems Abu Asaduzzaman Efficient Algorithm for Hardware/Software Partitioning and Scheduling on MPSoC
ID-based public key cryptography is proposed to simplify the management of the certification process and greatly reduce the public key authentication computation as well as communication cost. Certified e-mail protocol is a fair exchange of a message for a receipt between two potentially mistrusting parties over the network. A number of certified e-mail protocols have been studied in recent yea...
متن کاملTRICERT: A Distributed Certified E-Mail Scheme
In this paper we present protocols for distributed certified e-mail, which use encryption to ensure both confidentiality and fairness. As with other protocols for certified e-mail, ours achieve fairness by placing trust on an external entity, referred to as the Trusted Third Party (TTP). The TTP can become a bottleneck, however, and we explore scenarios that support a distributed TTP, in the co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 13 شماره
صفحات -
تاریخ انتشار 2005